


default search action
16th SIN 2023: Jaipur, India
- 16th International Conference on Security of Information and Networks, SIN 2023, Jaipur, India, November 20-21, 2023. IEEE 2023, ISBN 979-8-3503-4321-2

- Mayank Kumar, Radha Agrawal, Priyanka Singh

:
RAFT: Evaluating Federated Learning Resilience Against Threats. 1-6 - Panu Puhtila, Robin Carlsson, Sampsa Rauti:

Privacy Risks of Third-Party Services on Women's Shelter Websites. 1-6 - Keshav Kaushik

, Govind Sharma, Preeti Narooka, Gunjan Chhabra
, Ankit Vishnoi
:
HTML Smuggling: Attack and Mitigation. 1-5 - Mohon Dash Tanu, S. M. Fahim Faisal, Srabony Majumder, Mumtahinah Rahman Sristy, Rigan Paul, Muhammad Iqbal Hossain, Md. Sabbir Ahmed:

Hybrid Steganography: A Multi-Layered Framework for Hybrid Text and Image Concealment Enhanced by AES and LSB Techniques. 1-6 - Prabith GS, S. Abhishek, Anjali T

, Radhika Ravindran:
Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies. 1-9 - Manik Chandra Pandey

, Pradeep Singh Rawat:
Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic Review. 1-11 - Ishaan Shukla, Atharva Joshi, Shital Girme:

LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption. 1-6 - Jay Dave, Anshul Kanodia, Raj Srivastava, Kushagra Singh, Prithvi Hegde, Hitaishi Desai:

Secure and Efficient Key Management for Deduplicated Cloud Storage Systems. 1-6 - Harshita Jha, Surinder Kaur:

Implementation of Communication Aid Using Zigbee Technology Based On Personal Area Network(PAN). 1-6 - Md Sharafat Hossain

, Md Delwar Hossain
, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi:
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning. 1-8 - Virender, Lokesh Sharma, Satyabrata Roy, Umashankar Rawat:

Low-Rate DDoS Attack on SDN Controller and Its Impact. 1-6 - Soumi Ghosh, Kamal Upreti, Samreen Jafri

, Prakash Divakaran, Vandana Mishra Chaturvedi, Prashant Vats:
A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing Applications. 1-6 - Mazharul Islam

, Mubasshir Ahmed
, Rajesh Palit:
Storage and Maintenance of Sensitive Data using Homomorphic Encryption. 1-6 - Utsav Upadhyay

, Alok Kumar
, Satyabrata Roy, Umashankar Rawat, Sandeep Chaurasia:
Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems. 1-9 - Sampsa Rauti, Esko Vuorinen, Robin Carlsson, Panu Puhtila:

Data Leaks to Third-Party Services on Medical Websites. 1-7 - Aditi Sharma, Mukta Patel, Arjun Choudhary, Gajender Kumar

:
Blockchain Based Security Enabled Smart Contract for Energy Management. 1-7 - Anmol Kumar

, Mayank Agarwal:
Preserving Service Availability Under DDoS Attack in Micro-Service Based Cloud Infrastructure. 1-8 - Sanghamitra Nemmini, S. Abhishek, Anjali T

, Sincy Raj:
Fortifying Information Security: Security Implications of Microservice and Monolithic Architectures. 1-6 - Motahare Mounesan, Hossein Siadati, Sima Jafarikhah:

Exploring the Threat of Software Supply Chain Attacks on Containerized Applications. 1-8 - Meenakshi Gupta, Poonam Gera, Bharavi Mishra:

A Lightweight Certificateless Signcryption Scheme based on HCC for securing Underwater Wireless Sensor Networks (UWSNs). 1-8 - Hema Dhadhal, Paresh P. Kotak, Parvez Faruki, Atul Gonsai, Sajal Bhatia:

Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined Networks. 1-6 - Muhammad Aashiq Moosa, Apurva K. Vangujar, Dnyanesh Pramod Mahajan:

Detection and Analysis of DDoS Attack Using a Collaborative Network Monitoring Stack. 1-9 - Bagannagari Sai Teja, Baru Charita Sri, Gandam Vindya, Ch. Madhu Babu:

Emerging Technologies in the Fight Against Drug Counterfeiting - A Survey of Security Measures. 1-6 - Puneet Kumar Pal, Dhirendra Kumar

:
Image Encryption based on Chaotic Map and Fractal Sorting Matrix. 1-6 - Mayank Kumar, Radha Agrawal, Priyanka Singh

:
BATFL: Battling Backdoor Attacks in Federated Learning. 1-6 - Chudinov Pavel, Babenko Ludmila:

Analysis of the Semantic Webs for Their Information Security. 1-4 - Sahib J. Parmar, Vinitkumar R. Parmar, Jai Prakash Verma, Satyabrata Roy, Pronaya Bhattacharya:

Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications. 1-6 - Ritu Rai

, Jyoti Grover, Soumya Pandey:
Unveiling Threats: A Comprehensive Taxonomy of Attacks in In-Vehicle Networks. 1-7 - Akram Al-Rumaim

, Jyoti D. Pawar:
Exploring the Evolving Landscape of API Security Challenges in the Healthcare Industry: A Comprehensive Review. 1-8 - Sneha Rajagopal, Avanthika Gaur, P. Vinod:

Interpretable PDF Malware Detector. 1-6 - Santoshi Rudrakar, Parag H. Rughani, Jeet Rami:

UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoT. 1-6 - B. S. Vidhyasagar, M. Arvindhan, Sivakumar Kalimuthu

:
The Crucial Function that Clouds Access Security Brokers Play in Ensuring the Safety of Cloud Computing. 1-5 - Aviral Srivastava

, Viral Parmar
, Priyansh Sanghavi
, Seema Rani
:
Digital Power Play: Unraveling the Evolution of State-Sponsored Cyber Operations. 1-6 - Parth Parmar

, Jekil Gadhiya
, Satvik Vats, Deepak Kumar Verma, Krunal Vaghela:
A Review of DNA Cryptography: From a Data Protection Perspective. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














